Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-17 12:15:51 |
Don\'t Just Put Out the Zero-Day Fire - Get Rid of the Fuel (lien direct) |
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-17 11:20:48 |
Today\'s Predictions for Tomorrow\'s Internet: IBM Experts Look Ahead for NCSAM (lien direct) |
For week three of NCSAM, seven IBM Security experts offered their predictions about the future of the technology and cybercrime.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-16 13:01:17 |
Diving Into Zberp\'s Unconventional Process Injection Technique (lien direct) |
IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-16 12:00:49 |
Make Security Culture Your Top Priority (lien direct) |
An organization can have all the technology and expertise money can buy, but a poor security culture can still lead to devastating data breaches.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-16 11:05:55 |
Seven More NCSAM Tips for Cybersecurity Professionals: Week Two (lien direct) |
Individual users and organizations should take the time to adopt better security practices during National Cybersecurity Awareness Month (NCSAM).
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-13 11:35:44 |
Is My Fitness Band Protected? An Exercise in IoT Security (lien direct) |
Connected devices such as fitness bands hold the potential to revolutionize daily life, but they also pose IoT security risks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-12 12:00:51 |
How an Effective Incident Response Plan Can Help You Predict Your Security Future (lien direct) |
An incident response plan and thorough analysis of historical threat data can help security teams predict how fraudsters might breach their networks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-12 12:00:48 |
Not Your Father\'s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM (lien direct) |
These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-11 15:15:50 |
TrickBot Takes to Latin America, Continues to Expand Its Global Reach (lien direct) |
The cybergang operating the TrickBot banking Trojan were unusually active over the summer, launching new campaigns in Latin America and updating its code.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-11 13:10:46 |
Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month (lien direct) |
Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-11 11:30:46 |
Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption (lien direct) |
Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-10 11:55:46 |
The \'Cracken\': The Evolution of Password Cracking (lien direct) |
IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-10 11:10:46 |
Looking Back at Themes From National Cyber Security Awareness Month 2016 (lien direct) |
2016 may be in the past, but themes from last year's National Cyber Security Awareness Month should still be top of mind for security professionals.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-09 12:40:46 |
Five Ways an External Risk Adviser Can Help the Board Solve the Cyber Risk Puzzle (lien direct) |
Executives need an external risk adviser to help them monitor the cyber risk landscape and implement, monitor and refine security controls accordingly.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-09 11:55:52 |
Online Safety Tips for NCSAM 2017: Lessons From Week One (lien direct) |
Security professionals can take away these seven cybersecurity lessons from the first week of National Cyber Security Awareness Month (NCSAM).
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-09 11:20:45 |
Five Key Differences Between Personal and Enterprise Endpoint Security (lien direct) |
CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-06 12:00:50 |
Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks (lien direct) |
An advanced cyberattack can sink an entire company if it doesn't put the proper lifeboats in place and foster collaboration between disparate departments.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-06 12:00:47 |
The CISO\'s Guide to Minimizing Health Care Security Risks (lien direct) |
CISOs must possess skills and expertise in multiple areas to combat health care security risks in this age of ransomware and connected medical devices.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-05 11:50:42 |
Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks (lien direct) |
Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-05 11:45:42 |
Guarding the Crown Jewels: The Importance of Intellectual Property Security in the Age of Sprawl (lien direct) |
Intellectual property security is crucial to any company's bottom line. IT teams must locate this data, asses its risk and adjust policies accordingly.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-04 11:40:47 |
Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration (lien direct) |
Cybersecurity is like a seat belt: While uncomfortable at first, it is crucial to the safety of your organization as it undergoes a digital transformation.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-03 15:55:43 |
POS Malware Breach Sees Payment Cards Hit Underground Shops (lien direct) |
A popular fast-food chain and supermarket were recently breached by POS malware. Some of the credit card details had been up for sale for more than a week.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-03 11:55:40 |
Cybersecurity Strategy, Risk Management and List Making (lien direct) |
A framework such as the NIST CSF can help security professionals determine where to start when developing a cybersecurity strategy.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-03 11:20:43 |
Basic Security Tools You Cannot Afford to Miss in Your Risk Management Program (lien direct) |
Security professionals can leverage freely available, open source security tools to protect their environments from threats.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-02 12:10:43 |
The Cognitive Security Glide Path (lien direct) |
Cognitive security solutions help security teams distinguish valuable threat data from noise on the network and respond to incidents more efficiently.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-02 11:30:42 |
National Cyber Security Awareness Month: The 2017 Outlook (lien direct) |
October is National Cyber Security Awareness Month, a combined effort of private industries and public agencies to promote security best practices.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-10-02 08:25:41 |
How We Developed the IBM Security GDPR Framework (lien direct) |
IBM Security developed a five-phase GDPR framework to help organizations achieve and maintain compliance with the upcoming privacy law.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-29 13:00:55 |
Back to Filing Cabinets? Simplifying the Complex Task of Data Security (lien direct) |
Without visibility into all data stored on the network, the complex task of data security can have IT teams pining for the bygone days of filing cabinets.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-29 11:45:40 |
Getting an Earful: Convincing Employees to Care About Network Security (lien direct) |
When scare tactics and strict security policies fall on deaf ears, CISOs must find more productive ways to educate employees about network security risks.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-28 11:05:39 |
Six Key Traits of an Effective Cyber Risk Advisor (lien direct) |
What makes a good cyber risk advisor? Here are six traits and abilities that you should look for in a trusted security advisor.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-28 09:25:39 |
False Positives Are a True Negative: Using Machine Learning to Improve Accuracy (lien direct) |
Machine learning can be a boon for businesses, but effective machine learning must help analysts cut through the noise with few false positives.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-27 11:50:40 |
Put Threat Intelligence Into Action With Security Apps (lien direct) |
An update to IBM X-Force Exchange provides recommended apps to help users implement threat intelligence into their end-to-end security portfolio.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-27 11:00:42 |
What Do Recent Attacks Mean for OT Network Security? (lien direct) |
Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.
|
|
NotPetya
Wannacry
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-26 12:25:41 |
A \'Star Trek\' Darkly: To Boldly, Securely and Easily Go to the Cloud (lien direct) |
Tap into the "Star Trek" future through an identity-as-a-service solution light years ahead of its time.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-26 11:45:39 |
Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges (lien direct) |
Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-26 11:10:40 |
How the Value Outweighs the Cost of Security (lien direct) |
Regardless of a company's size, the value of building a strong security posture will always outweigh the cost of security.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-25 12:30:49 |
Worried About Apache Struts? Stay One Step Ahead of Endpoint Attacks (lien direct) |
Security teams needs advanced visibility into all endpoints across the organization to prevent endpoint attacks such as the recent Apache Struts exploit.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-25 11:50:41 |
From the Starship Enterprise to Your Enterprise: Eight Cybersecurity Lessons From \'Star Trek\' (lien direct) |
To prepare for the upcoming "Star Trek: Discovery" series, here are eight cybersecurity lessons companies can learn from the science fiction franchise.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-25 10:40:38 |
Data Activity Monitoring Gives Health Care Organizations X-Ray Vision Into Medical Imaging Security Risks (lien direct) |
Poor medical imaging security can have potentially life-threatening consequences such as delayed treatment, inaccurate diagnosis and prescription fraud.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-22 12:01:00 |
The Cloud Security Risks Hidden in Plain Sight (lien direct) |
Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-22 11:00:43 |
Building Digital Trust, One Blockchain at a Time (lien direct) |
Blockchain technology enables all participants in a transaction to validate whether the assets involved have been altered or tampered with.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-21 12:00:41 |
When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law (lien direct) |
When responding to a data breach, the CISO must work closely with the legal department to minimize the risks of litigation and reputational damage.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-21 12:00:37 |
The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security (lien direct) |
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-21 11:00:52 |
Leaking Cloud Databases and Servers Expose Over 1 Billion Records (lien direct) |
According to IBM X-Force, misconfigured cloud databases accounted for more than 71 percent of reported leaked records so far in 2017.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-20 13:15:34 |
Have We Been Wrong All Along About Good Password Practices? (lien direct) |
In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-20 12:01:03 |
IBM Named a Leader in Latest IDC Worldwide MarketScape (lien direct) |
IBM was named a leader in the "IDC MarketScape: Worldwide Managed Security Services 2017 Vendor Assessment" for its ability to integrate MSS globally.
|
Guideline
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-20 11:30:47 |
Don\'t Sweep Web Application Penetration Testing Under the Rug (lien direct) |
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-19 12:00:36 |
National IT Professionals Day: Recognizing the Saintly Patience of IT Workers (lien direct) |
CISOs should take a moment to recognize the hard work, patience and resilience of their staffers on National IT Professionals Day.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-19 11:15:33 |
Take a Hike: Navigating Your Identity Governance and Administration Process Engineering Journey (lien direct) |
Identity governance and administration process engineering remains a challenge despite growing awareness about the importance of IGA and IAM processes.
|
|
|
|
![securityintelligence.webp](./Ressources/img/securityintelligence.webp) |
2017-09-19 10:00:41 |
Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold (lien direct) |
IBM Managed Security Services (MSS) detected a sixfold increase in attacks involving embedded CPU mining tools between January and August 2017.
|
|
|
|